R003 Itsybitsy

Learnings

  • Windows binary tool - bitsadmin

  • File Sharing sites like pastebin[.]com

The room focuses on hunting for potential Command & Control (C2) communication by a machine. We are going to use HTTP connection logs to analyse these C2 patterns. As I am looking for suspicious attributes, the HTTP user-agent caught my eye. There are some events logged with user-agent named "bitsadmin". Bitsadmin is a Windows command line tool to create, download and manage queue jobs. You can learn more about the tool here.

Interestingly, when filtered on this user agent, it is visible that the user visited a site "pastebin.com". Pastebin sites are used for sharing code snippets. A user with malicious intentions can upload or share a malicious code, which when used in normal software may result in behaving abnormally.

With these events, the questions can be answered successfully.

THM Questions

Q1. How many events were returned for the month of March 2022?

1482

Q2. What is the IP associated with the suspected user in the logs?

192.166.65.54

Q3. The user’s machine used a legit windows binary to download a file from the C2 server. What is the name of the binary?

bitsadmin

Q4. The infected machine connected with a famous filesharing site in this period, which also acts as a C2 server used by the malware authors to communicate. What is the name of the filesharing site?

pastebin.com

Q5. What is the full URL of the C2 to which the infected host is connected?

pastebin.com/yTg0Ah6a

Q6. A file was accessed on the filesharing site. What is the name of the file accessed?

secret.txt

Q7. The file contains a secret code with the format THM{_____}.

THM{SECRET__CODE}

Last updated